Ontology type: schema:ScholarlyArticle
2013-04
AUTHORSChu-Hsing Lin, Hung-Yan Lin, Tang-Wei Wu, Ying-Hsuan Chen, Chien-Hua Huang
ABSTRACTOwing to the increasing threat of malwares and attacks, the defense mechanism design of various attacks becomes an important issue. Currently, there are various kinds of malwares, such as computer viruses, Trojan-horses, spywares, adwares, worms, and zombies, etc. Attacks are like zero-day attack, black-hole attack, Denial of Service attacks, man-in-the-middle attack and so on. The above attacks will be threats to the computer systems. This article focuses on the defense mechanism for Distributed Denial of Service (DDoS) attacks. DDoS attacks use a lot of request packets or garbage packets to occupy network bandwidth and consume performance of the target host. If the attack target is a commercial website, DDoS attacks will cause transmission delay and more seriously they will deny web services. In this paper, we propose a Double Check Priority Queue structure that effectively mitigates the impact of DDoS attacks in order that normal users can still access services. More... »
PAGES275-282
http://scigraph.springernature.com/pub.10.1007/s12652-011-0091-x
DOIhttp://dx.doi.org/10.1007/s12652-011-0091-x
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1021122170
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Communications Technologies",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Technology",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Tunghai University",
"id": "https://www.grid.ac/institutes/grid.265231.1",
"name": [
"Department of Computer Science, Tunghai University, 407, Taichung, Taiwan, ROC"
],
"type": "Organization"
},
"familyName": "Lin",
"givenName": "Chu-Hsing",
"id": "sg:person.010744504041.35",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010744504041.35"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Tunghai University",
"id": "https://www.grid.ac/institutes/grid.265231.1",
"name": [
"Tunghai University, 407, Taichung, Taiwan, ROC"
],
"type": "Organization"
},
"familyName": "Lin",
"givenName": "Hung-Yan",
"id": "sg:person.010365243171.81",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010365243171.81"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Tunghai University",
"id": "https://www.grid.ac/institutes/grid.265231.1",
"name": [
"Tunghai University, 407, Taichung, Taiwan, ROC"
],
"type": "Organization"
},
"familyName": "Wu",
"givenName": "Tang-Wei",
"id": "sg:person.015513407223.53",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015513407223.53"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Tunghai University",
"id": "https://www.grid.ac/institutes/grid.265231.1",
"name": [
"Tunghai University, 407, Taichung, Taiwan, ROC"
],
"type": "Organization"
},
"familyName": "Chen",
"givenName": "Ying-Hsuan",
"type": "Person"
},
{
"affiliation": {
"alternateName": "Tunghai University",
"id": "https://www.grid.ac/institutes/grid.265231.1",
"name": [
"Tunghai University, 407, Taichung, Taiwan, ROC"
],
"type": "Organization"
},
"familyName": "Huang",
"givenName": "Chien-Hua",
"type": "Person"
}
],
"citation": [
{
"id": "https://doi.org/10.1016/s1007-0214(09)70097-5",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1017203557"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1145/997150.997156",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1020238858"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1016/j.cose.2009.12.011",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1029536700"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1016/j.comnet.2010.05.002",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1029599983"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1016/j.camwa.2009.12.035",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1047847291"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/mcom.2002.1039856",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061393445"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/mcom.2003.1215651",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061393605"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/mcom.2005.1453433",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061394080"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/mic.2006.5",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061403645"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/seccomw.2006.359548",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094544788"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/icdcsw.2005.84",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1095118694"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/icdcsw.2005.84",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1095118694"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/pccc.2003.1203698",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1095470118"
],
"type": "CreativeWork"
}
],
"datePublished": "2013-04",
"datePublishedReg": "2013-04-01",
"description": "Owing to the increasing threat of malwares and attacks, the defense mechanism design of various attacks becomes an important issue. Currently, there are various kinds of malwares, such as computer viruses, Trojan-horses, spywares, adwares, worms, and zombies, etc. Attacks are like zero-day attack, black-hole attack, Denial of Service attacks, man-in-the-middle attack and so on. The above attacks will be threats to the computer systems. This article focuses on the defense mechanism for Distributed Denial of Service (DDoS) attacks. DDoS attacks use a lot of request packets or garbage packets to occupy network bandwidth and consume performance of the target host. If the attack target is a commercial website, DDoS attacks will cause transmission delay and more seriously they will deny web services. In this paper, we propose a Double Check Priority Queue structure that effectively mitigates the impact of DDoS attacks in order that normal users can still access services.",
"genre": "research_article",
"id": "sg:pub.10.1007/s12652-011-0091-x",
"inLanguage": [
"en"
],
"isAccessibleForFree": false,
"isPartOf": [
{
"id": "sg:journal.1043999",
"issn": [
"1868-5137",
"1868-5145"
],
"name": "Journal of Ambient Intelligence and Humanized Computing",
"type": "Periodical"
},
{
"issueNumber": "2",
"type": "PublicationIssue"
},
{
"type": "PublicationVolume",
"volumeNumber": "4"
}
],
"name": "Preserving quality of service for normal users against DDoS attacks by using Double Check Priority Queues",
"pagination": "275-282",
"productId": [
{
"name": "readcube_id",
"type": "PropertyValue",
"value": [
"64a30594989252016c6bb5344619b0bed4c67e90d6a915294872518700acf5f1"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/s12652-011-0091-x"
]
},
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1021122170"
]
}
],
"sameAs": [
"https://doi.org/10.1007/s12652-011-0091-x",
"https://app.dimensions.ai/details/publication/pub.1021122170"
],
"sdDataset": "articles",
"sdDatePublished": "2019-04-11T01:09",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8697_00000521.jsonl",
"type": "ScholarlyArticle",
"url": "http://link.springer.com/10.1007%2Fs12652-011-0091-x"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s12652-011-0091-x'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s12652-011-0091-x'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s12652-011-0091-x'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s12652-011-0091-x'
This table displays all metadata directly associated to this object as RDF triples.
124 TRIPLES
21 PREDICATES
39 URIs
19 LITERALS
7 BLANK NODES